Home / Advisories / KLCERT advisories / KLCERT-20-015: Remote Code Execution in ARC Informatique PcVue

KLCERT-20-015: Remote Code Execution in ARC Informatique PcVue

Kaspersky Lab publishes information on newly identified vulnerabilities in order to raise user awareness of the IT security threats detected. Kaspersky Lab does not make any guarantees in respect of information received from vendors of products in which vulnerabilities have been identified, which is included in the following sections of the advisory: Affected Products, Vendor Mitigation.

CVE-IDS CVE-2020-26867
Publication date 2020.10.09
Researcher Sergey Temnikov, Kaspersky ICS CERT
Andrey Muravitsky, Kaspersky ICS CERT
Description A Remote Code Execution vulnerability exists in PcVue from version 8.10 onward, due to the unsafe deserialization of messages received on the interface.
Impact Execution of an arbitrary process on the Web & Mobile back end server
CVSS v3 Base Score: 9.8
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitability Remotely
Difficulty Low
User interaction None
Existence of exploit PoC
Affected products
Affected products ARC Informatique PcVue 8.10 (including) through 12.0.17 (excluding)
Vendor mitigation Vendor provided detailed information for mitigation in the security bulletin SB2020-1 (login required). Download this document and follow the step by step instructions: https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1076-security-bulletin-2020-1
The user must be logged in to access the security notification.
Vendor’s security alert list: https://www.pcvuesolutions.com/security
Timeline October 2020 – Advisory published